Seventh IEEE International Conference on E-Commerce Technology (CEC'05)最新文献

筛选
英文 中文
An auction for scheduling delivery of highly demanded products 为高需求产品安排交货的拍卖
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.17
Sameer Korrapati, Peter R. Wurman
{"title":"An auction for scheduling delivery of highly demanded products","authors":"Sameer Korrapati, Peter R. Wurman","doi":"10.1109/ICECT.2005.17","DOIUrl":"https://doi.org/10.1109/ICECT.2005.17","url":null,"abstract":"We present a simple auction protocol for the sale of over-demanded goods with a delivery schedule. Under some reasonable assumptions, our mechanism is incentive compatible, collects only partial information about bidder's valuations, and empirical evidence suggests it converges to the efficient allocation.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126348936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing e-business-intelligence-service: a topic-guided text summarization framework 加强电子商务智能服务:主题导向的文本摘要框架
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.45
Shuhua Liu
{"title":"Enhancing e-business-intelligence-service: a topic-guided text summarization framework","authors":"Shuhua Liu","doi":"10.1109/ICECT.2005.45","DOIUrl":"https://doi.org/10.1109/ICECT.2005.45","url":null,"abstract":"Text summarization is a very important function in next generation e-business-intelligence-service. While human beings have proven to be extremely capable summarizers, computer based automated abstracting and summarizing has proven to be extremely challenging tasks. The dominant approach to text summarization is selection-based, by which the most content-bearing sentences or passages are identified and selected to compose a summary. However, the results from such a process often suffer from flaws such as incoherent content and poor readability due to unclear relationships between the selected text excerpts, dangling references, and so on. In this paper, we present a process model of topic guided text summarization - TIDE. By directing the content selection process with identified topic structure of the text, the logical relation between the selected sentences is captured and better presented, which is also valuable resource for a more complete and precise understanding of text meaning in the next stage of processing.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122291410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An auction mechanism for polynomial-time execution with combinatorial constraints 组合约束下多项式时间执行的拍卖机制
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.103
A. Andersson, J.-A. Holmstrom, Mattias Willman
{"title":"An auction mechanism for polynomial-time execution with combinatorial constraints","authors":"A. Andersson, J.-A. Holmstrom, Mattias Willman","doi":"10.1109/ICECT.2005.103","DOIUrl":"https://doi.org/10.1109/ICECT.2005.103","url":null,"abstract":"In this paper, we focus on the fact that even if we ignore the computational hardness of winner determination, a combinatorial auction is in many situations unlikely to produce the most efficient allocation. This is because each bidder has an exponential number of combinations to bid on, and basically only her own valuations as help when selecting combinations. This paper is based on the conjecture that for a large class of auction instances, given a reasonable restriction on the input each bidder can provide, there exists an auction mechanism where the winner determination problem can be solved in polynomial time, at the same time as the expected result is more efficient than that of a conventional combinatorial auction. The evidence is given by explicitly describing such an auction mechanism, and by simulation results.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128120050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Pareto-efficiency without giving-in: a two-phased protocol for multiple-attribute negotiations 不让步的帕累托效率:多属性谈判的两阶段协议
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.64
Florian Lang, Constantin Brunn
{"title":"Pareto-efficiency without giving-in: a two-phased protocol for multiple-attribute negotiations","authors":"Florian Lang, Constantin Brunn","doi":"10.1109/ICECT.2005.64","DOIUrl":"https://doi.org/10.1109/ICECT.2005.64","url":null,"abstract":"Multiple-attribute contracting allows the alignment of consumers' complex demand profiles and the specific delivery capabilities of suppliers. A two-phased negotiation model is introduced that includes both self-interested negotiations driven by a heuristic strategy and a joint-gains approach to win/win-negotiations. The concept of Pareto-efficiency on imperfect markets (integrative phase) is combined with a strategy-driven, non-altruistic approach to individual utility maximization (distributive phase). The concept of an agent based market is illustrated by grid services as an example negotiation object. The outlined mechanism is evaluated using the \"GeneLab\" simulation environment that allows to benchmark individual utility gains.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128017002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementing a RosettaNet business-to-business integration platform using J2EE and Web services 使用J2EE和Web服务实现RosettaNet企业对企业集成平台
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.52
Juho Tikkala, P. Kotinurmi, T. Soininen
{"title":"Implementing a RosettaNet business-to-business integration platform using J2EE and Web services","authors":"Juho Tikkala, P. Kotinurmi, T. Soininen","doi":"10.1109/ICECT.2005.52","DOIUrl":"https://doi.org/10.1109/ICECT.2005.52","url":null,"abstract":"E-business frameworks provide standards and specifications for integrating enterprise applications of business partners with less effort. We report experiences from developing a prototype implementing the messaging part of the RosettaNet e-business framework using commonly available open source tools. The requirements, design and implementation of the prototype are presented. The tools turned out to be suitable for the task, but some problems exist that e.g. limit the maximum message size. In addition, interoperability problems between different implementations of RosettaNet messaging arose due to RosettaNet using low expressive power message specification languages, thus leaving room for interpretation regarding message validation.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134097659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Promotional and commercial content distribution based on a legal and trusted P2P framework 基于合法和可信的P2P框架的推广和商业内容分发
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.71
M. Schmucker, P. Ebinger
{"title":"Promotional and commercial content distribution based on a legal and trusted P2P framework","authors":"M. Schmucker, P. Ebinger","doi":"10.1109/ICECT.2005.71","DOIUrl":"https://doi.org/10.1109/ICECT.2005.71","url":null,"abstract":"Peer-to-peer (P2P) file sharing systems have reached high popularity among computer users. They neither have a single point of failure nor a central bottleneck. Other benefits include scalability, load balancing, and fault tolerance. The distributed nature of P2P file sharing systems transfers the direct costs of storage and networking from the provider to the user. Unfortunately, P2P networks are also often used for content distribution that violates intellectual property rights (IPR). In this article, we show how a P2P file sharing system which adheres to IPR laws can be built. In contrast to existing digital rights management (DRM) systems which strongly interfere with accustomed content usage, our suggested solution does not impede familiar usage patterns and new content can be provided easily. The primary aim for the development of this architecture is to support new and niche artists by enabling the distribution of free and promotional content, however, the system can also be extended for the commercial distribution of content. Fingerprinting and cryptographic hash technologies are utilized to ensure legal and secure content distribution. Our proposed content distribution system is based on a self policing method whereby each user's content and activities are scrutinized by the peers they are exchanging content with. This allows the mutual monitoring of content between the communicating peers on the network and therefore, only authorized files can be exchanged. Finally, this model ensures that a user is liable for the distribution of non-authorized files.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132265430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security and privacy using one-round zero-knowledge proofs 使用一轮零知识证明的安全性和隐私性
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.78
Sultan Almuhammadi, C. Neuman
{"title":"Security and privacy using one-round zero-knowledge proofs","authors":"Sultan Almuhammadi, C. Neuman","doi":"10.1109/ICECT.2005.78","DOIUrl":"https://doi.org/10.1109/ICECT.2005.78","url":null,"abstract":"A zero-knowledge proof (ZKP) is an interactive proof that allows a prover to prove the knowledge of a secret to a verifier without revealing it. ZKPs are powerful tools to deal with critical applications in security e-commerce. Existing ZKPs are iterative in nature; their protocols require multiple communication rounds. The cost of iteration makes ZKPs unsuitable in practice. We propose a new protocol that meets all the requirements of ZKPs, yet runs in one round. The new approach substantially reduces computation and communications costs. It makes ZKPs more suitable for practical cryptographic systems for both government and commercial applications.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124306418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Ranking-based business information processing: applications to business solutions and eCommerce systems 基于排名的商业信息处理:应用于商业解决方案和电子商务系统
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.74
Mao Chen, J. Sairamesh
{"title":"Ranking-based business information processing: applications to business solutions and eCommerce systems","authors":"Mao Chen, J. Sairamesh","doi":"10.1109/ICECT.2005.74","DOIUrl":"https://doi.org/10.1109/ICECT.2005.74","url":null,"abstract":"Extracting crucial information in high volume business data efficiently are critical for enterprises to make timely business decisions and adapt accordingly. This paper proposes a novel ranking-based system that applies knowledge models and utility functions. In a case study for monitoring and analyzing automotive failures in aftermarket services, we shed a light on our ranking mechanism that combines objective business metrics and \"subjective\" domain knowledge. Our experiments using real-world data demonstrate that our methodology is capable of capturing macro view about business performance issues from a small but important fraction of information.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121209636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards an integrated privacy framework for HIPAA-compliant Web services 为符合hipaa的Web服务提供集成的隐私框架
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.95
Vivying S. Y. Cheng, P. Hung
{"title":"Towards an integrated privacy framework for HIPAA-compliant Web services","authors":"Vivying S. Y. Cheng, P. Hung","doi":"10.1109/ICECT.2005.95","DOIUrl":"https://doi.org/10.1109/ICECT.2005.95","url":null,"abstract":"A Web service is a software system designed to support interoperable application-to-application interaction over the Internet. Web services are based on a set of XML standards, such as universal description, discovery and integration (UDDI), Web services description language (WSDL), and simple object access protocol (SOAP). Based on prior studies, this paper proposes a vocabulary-based Web services privacy framework for protecting health data privacy under the Health Insurance Portability and Accountability Act of 1996 (HIPAA).","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122858306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Push concepts to control interactions in e-commerce 推动概念以控制电子商务中的交互
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.72
S. Robra-Bissantz, A. Zabel
{"title":"Push concepts to control interactions in e-commerce","authors":"S. Robra-Bissantz, A. Zabel","doi":"10.1109/ICECT.2005.72","DOIUrl":"https://doi.org/10.1109/ICECT.2005.72","url":null,"abstract":"As empirical studies show, customers often stop synchronous communication with a supplier during e-commerce processes. In order to overcome these stoppages, Push concepts on the interaction level take over or at least trigger customer activities. On the one hand this supports the customer in continuing his/her communication with the Web-shop, on the other hand it helps the supplier to regain control of transaction processes. This article deals with the identification of push opportunities on interaction level and shows concepts for individual push activities. These push concepts are prototypically implemented in a push system that may complement any shop system. For first experiences in a practical setting it is introduced to the customer portal of REHAU AG+Co.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124695137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信